MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a6544621e2269b086855e399b0cb58f830ffaa613e0afc563e8f7e72d3087011. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: a6544621e2269b086855e399b0cb58f830ffaa613e0afc563e8f7e72d3087011
SHA3-384 hash: ae6cdcbd06d260f969ea7fc97a87368367440a29b49263627ccde0803da4140eff33ec7cb1cf96c618f4ef25072ea1e6
SHA1 hash: 7a3c18360db05e9858d4cf006b572f2c77ed42eb
MD5 hash: 6df0df8c8c349ab748d31d06008a6ce0
humanhash: seven-nineteen-nevada-april
File name:a6544621e2269b086855e399b0cb58f830ffaa613e0afc563e8f7e72d3087011
Download: download sample
Signature SnakeKeylogger
File size:960'357 bytes
First seen:2023-01-06 13:30:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 431 x GuLoader)
ssdeep 12288:2YVO4e20BZhlAMuY5N8VVxxXIvEA8+huwhUSdBIQudJnCoe/b:2YsQ0BZhlAMPSDIRThuwhxDAPC5b
Threatray 41 similar samples on MalwareBazaar
TLSH T12E1502FC36949772CD2049F0FB3FCBE55E717D5B20F856A22249BB6925B6001F807A68
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon e0d0d8d4d4d8d0e0 (7 x DarkCloud, 5 x AgentTesla, 4 x Formbook)
Reporter adrian__luca
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
179
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a6544621e2269b086855e399b0cb58f830ffaa613e0afc563e8f7e72d3087011
Verdict:
Malicious activity
Analysis date:
2023-01-06 13:31:01 UTC
Tags:
autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a process from a recently created file
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 779066 Sample: Qi1CIP8mJH.exe Startdate: 06/01/2023 Architecture: WINDOWS Score: 84 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected Telegram RAT 2->26 28 Yara detected Snake Keylogger 2->28 8 Qi1CIP8mJH.exe 20 2->8         started        process3 file4 20 C:\Users\user\AppData\...\ryivvswzsq.exe, PE32 8->20 dropped 11 ryivvswzsq.exe 8->11         started        process5 signatures6 30 Machine Learning detection for dropped file 11->30 32 Found API chain indicative of debugger detection 11->32 34 Maps a DLL or memory area into another process 11->34 14 ryivvswzsq.exe 1 11->14         started        process7 process8 16 WerFault.exe 23 9 14->16         started        18 conhost.exe 14->18         started       
Threat name:
Win32.Spyware.SnakeLogger
Status:
Malicious
First seen:
2022-12-26 10:48:36 UTC
File Type:
PE (Exe)
Extracted files:
32
AV detection:
20 of 26 (76.92%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
bb6862abce8f297672bf358af836760a6c1fe381571ce8059759b5a84809d195
MD5 hash:
4947a717c54f45927de5fda2bd0fae96
SHA1 hash:
9ad5ddd623e44ec61f322c249e8d0f0ae5e33329
SH256 hash:
e439f02b72a882498d512689f380e1323c4d8342578fe8608e81061cf4a8aee1
MD5 hash:
3d90ab79b9719aded136b7cd437ebb21
SHA1 hash:
dbec6e868a293cb0bd58d35191b1423ab8942384
SH256 hash:
a6544621e2269b086855e399b0cb58f830ffaa613e0afc563e8f7e72d3087011
MD5 hash:
6df0df8c8c349ab748d31d06008a6ce0
SHA1 hash:
7a3c18360db05e9858d4cf006b572f2c77ed42eb
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments